SlideShare a Scribd company logo
1 of 4
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 07, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 507
A Secure Chaotic Communication System
Mr. Pravin Mawale1
Ms. Vrushali Shirpurkar2
Prof. Gouri Halde3
Prof. Sony Chaturvedi4
3,4
Professor
1,2,3,4
Department of Electronics and Communication Engineering
1,2,3,4
P.I.E.T. R.T.M. Nagpur University
Abstract— New generation communication networks are
moving towards autonomous wireless infrastructures which
are very popular in the application of multimedia
broadcasting and mobile communication where N numbers
of data are transfer through the wireless network every day.
In such applications security of transmitted signal is very
important in wireless communication network. So the
proposed work creates a methodology to increase the
security of the data and communication using chaotic
encryption algorithm to transfer the data from the wireless
network. A proposed new structure is based on coupling of
chaotic system. We combine the text message with the
chaotic signals to reduce the attack and improve the security
of the data. The performance of BER in AWGN channel are
verified and analyzed with MATLAB toolbox.
Keywords: Wireless Network, Chaotic algorithm,
Encryption, Decryption, BER
I. INTRODUCTION
The field of chaotic communications has gone through
various periods of intense interest, initiated by Shannon’s
1947 recognition that the channel capacity of a
communications link is optimized when the waveform is a
noise-like maximal entropy signal [1] and further solidified
by Chua’s 1980 implementation of a practical chaotic
electrical circuit [2]. Chaotic communication systems
resemble direct sequence spread spectrum communication
systems in that the data is spread across a relatively wide
transmission bandwidth and then de spread by the intended
receiver with a time-synchronized spreading sequence.
These systems tend to be more computationally complex
than non-spread communication systems, yet they provide
advantageous multipath mitigation and multi-user spectral
re-use capabilities. The chaotic sequence based
communication systems exhibit analytically better
performance than direct sequence based communication
systems and may in general be viewed as a generalization of
direct sequence approaches; as its layman’s connotation
would suggest, a chaotic sequence or system evolves in a
seemingly random fashion, while the direct sequence system
is limited to a small finite set of values. The most significant
limitation of chaotic communication systems is the extreme
precision needed to accurately synchronize and track two
independent instantiations of an “identical” chaotic circuit as
used at a transmitter and a receiver. Active research in
chaotic communications was revived in the early 1990s
when various chaotic circuit synchronization methods were
demonstrated, leading to limited communications
capabilities; each of the proposed methods had drawbacks
that limited their practical implementations. During this
period, the theoretical performance of chaotic
communications has been shown by various authors
[3][4][5][6] to exceed that of direct sequence systems and,
ultimately, to satisfy Shannon’s noise-like waveform
characteristics for a maximal entropy waveform that
maximizes channel capacity. To date, nobody has
demonstrated a sufficiently robust chaotic circuit
synchronization method that supports practical coherent
chaotic communications with direct sequence approaches.
The proposed work presents a divergence from the
traditional chaotic communications approaches that harness
analog chaotic circuits by implementing a fully digital
chaotic circuit that is then conditioned for use in a prototype
coherent chaotic communications system. Topics include a
comparison of analog and digital chaotic circuits;
implementation of digital chaotic circuits for use in chaotic
communications; analytical, simulation, and measured
hardware results for a prototype coherent communication
system; and generalization of the fundamental chaotic
waveform to multipath mitigation techniques, multiple
access communication systems, permission-based
communication systems, and a new class of maximal
entropy amplitude modulated chaotic waveform hybrids for
use in specific applications.
II. FORMULATION OF CHAOTIC SYSTEMS
The Lorenz system is a system of ordinary differential
equations (the Lorenz equations) first studied by Edward
Lorenz. It is notable for having chaotic solutions for certain
parameter values and initial conditions. In particular, the
Lorenz attractor is a set of chaotic solutions of the Lorenz
system which, when plotted, resemble a butterfly or figure
eight.
A general chaotic system can be described as the
following dynamic equation:
̇ ( ) (1)
Where Ax is the linear part, g(x) is the nonlinear
part of this system. In this paper, the chaotic security system
is constructed by using Lorenz’s chaotic system which is an
autonomous 3-order nonlinear system. Its dynamic states are
presented as following:
ẋ = dx/dt=s*(y-x)
ẏ = dy/dt=r*x-y-xz (2)
z = dz/dt=x*y-b*z;
Where x, y, and z are the dynamic states, r, s, and b
are constants greater than zero. Fig. 1 shows the attractor of
Eq. (2) with the parameters of r=28, s=10, b=8/3 and initial
state of [x0, y0, z0] =[0.1, 0.2 , 0.3].
The proposed scheme can be distributed
by a coupled chaotic system. The input message
signal M is masked by the chaotic state
variables and transmitted. The equations of
encryption for transmitter and decryption for
receiver systems are mentioned as follows:
A Secure Chaotic Communication System
(IJSRD/Vol. 2/Issue 07/2014/111)
All rights reserved by www.ijsrd.com 508
Encrypt side (transmitter): .ẋ Ax g(x,v)
Lzx. (3)
where v x1 M
Decrypt side (receiver): y Ay g(y,v) Lzy.
(4)
Fig. 1: The Lorenz chaotic attractor
where x €Rn , y €Rn are the state
vectors. Ax and Ay are the linear part the
system, g(x,v) and g( y,v) are the nonlinear
part of the system, L is the controller gain of
the system, K>0 is the coupling strength between
master and slave system, zx and zy are the
feedback signal.
From Eqs. (3) and (4), at wired chaotic security
system, the encrypted message and decrypted message are
shown in Fig. 2, respectively. The parameters are set at
r=28, s=10, b=8/3, h=0.01, l1=0, l2=38, l3=0. The initial
states of transmeter are [x10,x20,x30]=[0.1,0,0] and states of
slave are [y10,y20,y30]=[0.15,0,0].InFig.2,the decrypted
message is identical to encrypted one. However, in
environment like wireless, the decrypted message is
critically damaged as shown in Fig. 3 due to the propagation
delay, uncertainty signal fading and so on. Furthermore, the
Gaussian distribution noise will be added into the
transmitted chaotic signal and damaged its primal state in
AWGN (Additive White Gaussian Noise) channel.
Fig. 2: for perfectly decrepted data
Fig. 3: cryticaly damaged decrypt message
III. PROPOSED ALGORITHM
Following is the outline for proposed text based Chaotic
Communication algorithm.
(1) Take a input text message.
(2) Apply chaotic encryption algorithm for encoding of
the text document.
(3) Transmit encrypted data from different n number of
transmitter channel.
(4) Formation of NF Coupling between transmitter and
receivers.
(5) Receiving data from different n number of
receivers.
(6) Calculating BER (Bit Error Rate).
(7) Combining different outputs from all receivers and
finding its threshold value.
(8) Performing chaotic decryption algorithm on output.
IV. BIT ERROR RATE
In digital transmission, the number of bit errors is the
number of received bits of a data stream over a
communication channel that has been altered due to noise,
interference, distortion or bit synchronization errors. The bit
error rate or bit error ratio (BER) is the number of bit errors
divided by the total number of transferred bits during a
studied time interval. BER is a unit less performance
measure, often expressed as a percentage. The bit error
probability pe is the expectation value of the BER. The BER
can be considered as an approximate estimate of the bit error
probability. This estimate is accurate for a long time interval
and a high number of bit errors.
Example:
As an example, assume this transmitted bit sequence:
0 1 1 0 0 0 1 0 1 1,
and the following received bit sequence:
0 0 1 0 1 0 1 0 0 1,
The number of bit errors (the underlined bits) is in
this case 3. The BER is 3 incorrect bits divided by 10
transferred bits, resulting in a BER of 0.3 or 30%.
V. FLOWCHART OF PROPOSED METHOD
Lets see the details of flow chart which is shown in figure 4
Step 1: Take an input text message want to transmit
Take the text message you want to transmit through the
communication network. In message stream words are
converted according to their ASCII values and the those
ASCII numbers are converted into binary number for the
transmission through the network.
Step 2: Appling Chaotic communication
encryption algorithm:
Applying the chaotic encryption algorithm for breaking the
text message in number of data packets in Encrypted form.
A Secure Chaotic Communication System
(IJSRD/Vol. 2/Issue 07/2014/111)
All rights reserved by www.ijsrd.com 509
Step 3: Transmit encrypted data
Transmit the encrypted data packets from the different n
number of transmitters.
Step 4: Receive text message packets
Receive the encrypted data through the different number
Receivers
Step 5: Calculating BRR (Bit Error Rate) and combining
the data:
Fig. 4: Flow chart of the proposed Text Based Chaotic
Communication
Now calculate the Bit Error Rate for finding the
number of data loses during the transmission of data through
the network. Now all the data receive from the different
receivers are combining to get the original transmitted
message transmit from the source.
Simulation Table and Graphs
Coupling Data Length Noise Level Variance
1 36 10 0.06
1 36 15 0.243
1 36 25 0.32
2 36 10 0.03
2 36 15 0.111
2 36 25 0.227
3 36 10 0.015
3 36 15 0.055
3 36 25 0.113
4 36 10 0.008
4 36 15 0.027
4 36 25 0.056
5 36 10 0.003
5 36 15 0.013
5 36 25 0.028
Table 2: Simulation Result table
Table 1 shows that when we increase the coupling
level the value of variance in reduced continuously.
Graph 1: Simulation result against coupling verses variance
Fig. 5: Simulation Result for coupling 1 and noise level 10
with lorentz
Fig. 6: Simulation Result for coupling 1 and noise level 25
without lorentz
Fig. 7: Simulation Result for coupling 3 and noise level 25
with lorentz
Fig. 8: Simulation Result for coupling 3 and noise level 25
without lorentz
0
0.2
0.4
111 222 333 444 555
Variance
Variance
Rx
1
Tx
1
Combini
ng Msg.
Rx
2
Tx
2
Finding
BER
Input
Text
Finding
Threshol
d Value
Tx
n
Rxn
Output
Messag
e
A Secure Chaotic Communication System
(IJSRD/Vol. 2/Issue 07/2014/111)
All rights reserved by www.ijsrd.com 510
VI. CONCLUSION
The proposed work presents the methodology to secure the
wireless communication. For this we used the chaotic
communication system. For transferring the data from one
place to another we first used encryption method and break
the data into n number of packets by using chaotic
encryption mechanism. We add the data packets with
chaotic signals to increase the security of data transfer in the
communication network. The proposed work gives the
comparison of transmission of data with and without chaotic
signals and we observed that the bit error rate of the
transmitted data is reduced with improved security using
chaotic communication. Results graph shows that we are
able to transfer the data with the noise and received it on the
receiver side successfully. In the simulation results, the
relativity BER and number of Encrypt/Decrypt system
analysis is discussed.
REFERENCES
[1] C. Shannon, “Communication in the presence of
noise,” Proc. Inst. Radio Eng., vol. 37, pp. 10–21, Jan
2011.
[2] L. Chua, “Dynamic nonlinear networks: State-of-the-
art,” IEEE Transactions on Circuits and Systems,vol.
27, pp. 1059–1087, Nov 1980.
[3] H. Dedieu, M. Kennedy, and M. Hasler, “Chaos shift
keying: modulation and demodulation of a
chaoticcarrier using self-synchronizing chua’s
circuits,” IEEE Transactions on Circuits and Systems
II, vol. 40,pp. 634–642, 1993.
[4] R. Pickholtz, D. Schilling, and L. Milstein, “Theory
of spread spectrum communications – a tutorial,”
IEEE Transactions on Communications, vol. 30, pp.
855–884, May 2012.
[5] G. Kolumban, M. Kennedy, and L. Chua, “The role
of synchronization in digital communications
usingchaos: Fundamentals of digital
communications,” IEEE Transactions on Circuits and
Systems I: Funda-mental Theory and Applications,
vol. 44, no. 10, pp. 927–936, Oct 1997.
[6] M. Hasler and Y. Maistrenko, “An introduction to the
synchronization of chaotic systems: coupled skewtent
maps,” IEEE Transactions on Circuits and Systems I:
Fundamental Theory and Applications, vol. 44,no.
10, pp. 856–866, Oct 1997.
[7] R. Scholtz, “The origins of spread-spectrum
communications,” IEEE Transactions on
Communications,vol. 30, pp. 822–854, 2008.
[8] E. Appleton and M. Barnett, “On some direct
evidence for downward atmospheric reflection of
electricrays,” Proceedings Royal Society Series A,
vol. 109, pp. 621–641, Dec 2010.
[9] J. Boone and R. Peterson, “SIGSALY: the start of the
digital
revolution,”http://www.nsa.gov/publications/publi00
019.cfm, 23 Apr 2007.
[10]C. Shannon, “A mathematical theory of
communication,” Bell System Technical Journal, vol.
27, pp. 379–423, 623–656, 1948.
[11]C. Shannon, “Communication theory of secrecy
systems,” Bell System Technical Journal, vol. 28, pp.
656–715, Oct 1949.
[12]R. Pickholtz, L. Milstein, and D. Schilling, “Spread
spectrum for mobile communications,” IEEE Trans-
actions on Vehicular Technology, vol. 40, pp. 313–
322, May 1991.
[13]Celikovsk´y, S., and Vanˇeˇcek, A. Bilinear systems
and chaos.Kybernetika , 403–424.
[14]Vanˇeˇcek, A., and ˇ Celikovsk´y, S. Control systems:
from linear analysis to synthesis of chaos. Prentice-
Hall, London, 1996.
[15]Chen, G., and Li, Z. Global synchronization and
asymptotic stability of complex dynamical networks.
IEEE Trans. on Circ. Sys.–II 53 (2006), 28–33.
[16]Menezes, A. J., Vanstone, S. A., and Oorschot, P. C.
V.Handbook of Applied Cryptography. CRC Press,
Inc., Boca Raton, FL,USA, 1996.

More Related Content

What's hot

Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...paperpublications3
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedDebesh Sadhukhan
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 
Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolZac Darcy
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmeSAT Publishing House
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
 
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...IJCNCJournal
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location InformationIJMER
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...IJTET Journal
 
Csit54201
Csit54201Csit54201
Csit54201csandit
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network IJECEIAES
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 

What's hot (20)

Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
Secure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay NetworksSecure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay Networks
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
 
F04503057062
F04503057062F04503057062
F04503057062
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocol
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdm
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location Information
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
 
B035410013
B035410013B035410013
B035410013
 
Vampire attacks
Vampire attacksVampire attacks
Vampire attacks
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
 
Csit54201
Csit54201Csit54201
Csit54201
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 

Similar to A Secure Chaotic Communication System

Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
Performance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding usingPerformance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding usingeSAT Publishing House
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...IJMTST Journal
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
 
A typical analysis of hybrid covert channel using constructive entropy analy...
A typical analysis of hybrid covert channel using constructive  entropy analy...A typical analysis of hybrid covert channel using constructive  entropy analy...
A typical analysis of hybrid covert channel using constructive entropy analy...IJECEIAES
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
 
Design of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codesDesign of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codesIAEME Publication
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Ijctt v17 p128-copy-copy
Ijctt v17 p128-copy-copyIjctt v17 p128-copy-copy
Ijctt v17 p128-copy-copySelva Raj
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 

Similar to A Secure Chaotic Communication System (20)

Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
Performance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding usingPerformance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding using
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
 
A typical analysis of hybrid covert channel using constructive entropy analy...
A typical analysis of hybrid covert channel using constructive  entropy analy...A typical analysis of hybrid covert channel using constructive  entropy analy...
A typical analysis of hybrid covert channel using constructive entropy analy...
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
 
Design of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codesDesign of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codes
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
 
1757 1761
1757 17611757 1761
1757 1761
 
1757 1761
1757 17611757 1761
1757 1761
 
OSI MODELS.pptx
OSI  MODELS.pptxOSI  MODELS.pptx
OSI MODELS.pptx
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Ijctt v17 p128-copy-copy
Ijctt v17 p128-copy-copyIjctt v17 p128-copy-copy
Ijctt v17 p128-copy-copy
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 

A Secure Chaotic Communication System

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 07, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 507 A Secure Chaotic Communication System Mr. Pravin Mawale1 Ms. Vrushali Shirpurkar2 Prof. Gouri Halde3 Prof. Sony Chaturvedi4 3,4 Professor 1,2,3,4 Department of Electronics and Communication Engineering 1,2,3,4 P.I.E.T. R.T.M. Nagpur University Abstract— New generation communication networks are moving towards autonomous wireless infrastructures which are very popular in the application of multimedia broadcasting and mobile communication where N numbers of data are transfer through the wireless network every day. In such applications security of transmitted signal is very important in wireless communication network. So the proposed work creates a methodology to increase the security of the data and communication using chaotic encryption algorithm to transfer the data from the wireless network. A proposed new structure is based on coupling of chaotic system. We combine the text message with the chaotic signals to reduce the attack and improve the security of the data. The performance of BER in AWGN channel are verified and analyzed with MATLAB toolbox. Keywords: Wireless Network, Chaotic algorithm, Encryption, Decryption, BER I. INTRODUCTION The field of chaotic communications has gone through various periods of intense interest, initiated by Shannon’s 1947 recognition that the channel capacity of a communications link is optimized when the waveform is a noise-like maximal entropy signal [1] and further solidified by Chua’s 1980 implementation of a practical chaotic electrical circuit [2]. Chaotic communication systems resemble direct sequence spread spectrum communication systems in that the data is spread across a relatively wide transmission bandwidth and then de spread by the intended receiver with a time-synchronized spreading sequence. These systems tend to be more computationally complex than non-spread communication systems, yet they provide advantageous multipath mitigation and multi-user spectral re-use capabilities. The chaotic sequence based communication systems exhibit analytically better performance than direct sequence based communication systems and may in general be viewed as a generalization of direct sequence approaches; as its layman’s connotation would suggest, a chaotic sequence or system evolves in a seemingly random fashion, while the direct sequence system is limited to a small finite set of values. The most significant limitation of chaotic communication systems is the extreme precision needed to accurately synchronize and track two independent instantiations of an “identical” chaotic circuit as used at a transmitter and a receiver. Active research in chaotic communications was revived in the early 1990s when various chaotic circuit synchronization methods were demonstrated, leading to limited communications capabilities; each of the proposed methods had drawbacks that limited their practical implementations. During this period, the theoretical performance of chaotic communications has been shown by various authors [3][4][5][6] to exceed that of direct sequence systems and, ultimately, to satisfy Shannon’s noise-like waveform characteristics for a maximal entropy waveform that maximizes channel capacity. To date, nobody has demonstrated a sufficiently robust chaotic circuit synchronization method that supports practical coherent chaotic communications with direct sequence approaches. The proposed work presents a divergence from the traditional chaotic communications approaches that harness analog chaotic circuits by implementing a fully digital chaotic circuit that is then conditioned for use in a prototype coherent chaotic communications system. Topics include a comparison of analog and digital chaotic circuits; implementation of digital chaotic circuits for use in chaotic communications; analytical, simulation, and measured hardware results for a prototype coherent communication system; and generalization of the fundamental chaotic waveform to multipath mitigation techniques, multiple access communication systems, permission-based communication systems, and a new class of maximal entropy amplitude modulated chaotic waveform hybrids for use in specific applications. II. FORMULATION OF CHAOTIC SYSTEMS The Lorenz system is a system of ordinary differential equations (the Lorenz equations) first studied by Edward Lorenz. It is notable for having chaotic solutions for certain parameter values and initial conditions. In particular, the Lorenz attractor is a set of chaotic solutions of the Lorenz system which, when plotted, resemble a butterfly or figure eight. A general chaotic system can be described as the following dynamic equation: ̇ ( ) (1) Where Ax is the linear part, g(x) is the nonlinear part of this system. In this paper, the chaotic security system is constructed by using Lorenz’s chaotic system which is an autonomous 3-order nonlinear system. Its dynamic states are presented as following: ẋ = dx/dt=s*(y-x) ẏ = dy/dt=r*x-y-xz (2) z = dz/dt=x*y-b*z; Where x, y, and z are the dynamic states, r, s, and b are constants greater than zero. Fig. 1 shows the attractor of Eq. (2) with the parameters of r=28, s=10, b=8/3 and initial state of [x0, y0, z0] =[0.1, 0.2 , 0.3]. The proposed scheme can be distributed by a coupled chaotic system. The input message signal M is masked by the chaotic state variables and transmitted. The equations of encryption for transmitter and decryption for receiver systems are mentioned as follows:
  • 2. A Secure Chaotic Communication System (IJSRD/Vol. 2/Issue 07/2014/111) All rights reserved by www.ijsrd.com 508 Encrypt side (transmitter): .ẋ Ax g(x,v) Lzx. (3) where v x1 M Decrypt side (receiver): y Ay g(y,v) Lzy. (4) Fig. 1: The Lorenz chaotic attractor where x €Rn , y €Rn are the state vectors. Ax and Ay are the linear part the system, g(x,v) and g( y,v) are the nonlinear part of the system, L is the controller gain of the system, K>0 is the coupling strength between master and slave system, zx and zy are the feedback signal. From Eqs. (3) and (4), at wired chaotic security system, the encrypted message and decrypted message are shown in Fig. 2, respectively. The parameters are set at r=28, s=10, b=8/3, h=0.01, l1=0, l2=38, l3=0. The initial states of transmeter are [x10,x20,x30]=[0.1,0,0] and states of slave are [y10,y20,y30]=[0.15,0,0].InFig.2,the decrypted message is identical to encrypted one. However, in environment like wireless, the decrypted message is critically damaged as shown in Fig. 3 due to the propagation delay, uncertainty signal fading and so on. Furthermore, the Gaussian distribution noise will be added into the transmitted chaotic signal and damaged its primal state in AWGN (Additive White Gaussian Noise) channel. Fig. 2: for perfectly decrepted data Fig. 3: cryticaly damaged decrypt message III. PROPOSED ALGORITHM Following is the outline for proposed text based Chaotic Communication algorithm. (1) Take a input text message. (2) Apply chaotic encryption algorithm for encoding of the text document. (3) Transmit encrypted data from different n number of transmitter channel. (4) Formation of NF Coupling between transmitter and receivers. (5) Receiving data from different n number of receivers. (6) Calculating BER (Bit Error Rate). (7) Combining different outputs from all receivers and finding its threshold value. (8) Performing chaotic decryption algorithm on output. IV. BIT ERROR RATE In digital transmission, the number of bit errors is the number of received bits of a data stream over a communication channel that has been altered due to noise, interference, distortion or bit synchronization errors. The bit error rate or bit error ratio (BER) is the number of bit errors divided by the total number of transferred bits during a studied time interval. BER is a unit less performance measure, often expressed as a percentage. The bit error probability pe is the expectation value of the BER. The BER can be considered as an approximate estimate of the bit error probability. This estimate is accurate for a long time interval and a high number of bit errors. Example: As an example, assume this transmitted bit sequence: 0 1 1 0 0 0 1 0 1 1, and the following received bit sequence: 0 0 1 0 1 0 1 0 0 1, The number of bit errors (the underlined bits) is in this case 3. The BER is 3 incorrect bits divided by 10 transferred bits, resulting in a BER of 0.3 or 30%. V. FLOWCHART OF PROPOSED METHOD Lets see the details of flow chart which is shown in figure 4 Step 1: Take an input text message want to transmit Take the text message you want to transmit through the communication network. In message stream words are converted according to their ASCII values and the those ASCII numbers are converted into binary number for the transmission through the network. Step 2: Appling Chaotic communication encryption algorithm: Applying the chaotic encryption algorithm for breaking the text message in number of data packets in Encrypted form.
  • 3. A Secure Chaotic Communication System (IJSRD/Vol. 2/Issue 07/2014/111) All rights reserved by www.ijsrd.com 509 Step 3: Transmit encrypted data Transmit the encrypted data packets from the different n number of transmitters. Step 4: Receive text message packets Receive the encrypted data through the different number Receivers Step 5: Calculating BRR (Bit Error Rate) and combining the data: Fig. 4: Flow chart of the proposed Text Based Chaotic Communication Now calculate the Bit Error Rate for finding the number of data loses during the transmission of data through the network. Now all the data receive from the different receivers are combining to get the original transmitted message transmit from the source. Simulation Table and Graphs Coupling Data Length Noise Level Variance 1 36 10 0.06 1 36 15 0.243 1 36 25 0.32 2 36 10 0.03 2 36 15 0.111 2 36 25 0.227 3 36 10 0.015 3 36 15 0.055 3 36 25 0.113 4 36 10 0.008 4 36 15 0.027 4 36 25 0.056 5 36 10 0.003 5 36 15 0.013 5 36 25 0.028 Table 2: Simulation Result table Table 1 shows that when we increase the coupling level the value of variance in reduced continuously. Graph 1: Simulation result against coupling verses variance Fig. 5: Simulation Result for coupling 1 and noise level 10 with lorentz Fig. 6: Simulation Result for coupling 1 and noise level 25 without lorentz Fig. 7: Simulation Result for coupling 3 and noise level 25 with lorentz Fig. 8: Simulation Result for coupling 3 and noise level 25 without lorentz 0 0.2 0.4 111 222 333 444 555 Variance Variance Rx 1 Tx 1 Combini ng Msg. Rx 2 Tx 2 Finding BER Input Text Finding Threshol d Value Tx n Rxn Output Messag e
  • 4. A Secure Chaotic Communication System (IJSRD/Vol. 2/Issue 07/2014/111) All rights reserved by www.ijsrd.com 510 VI. CONCLUSION The proposed work presents the methodology to secure the wireless communication. For this we used the chaotic communication system. For transferring the data from one place to another we first used encryption method and break the data into n number of packets by using chaotic encryption mechanism. We add the data packets with chaotic signals to increase the security of data transfer in the communication network. The proposed work gives the comparison of transmission of data with and without chaotic signals and we observed that the bit error rate of the transmitted data is reduced with improved security using chaotic communication. Results graph shows that we are able to transfer the data with the noise and received it on the receiver side successfully. In the simulation results, the relativity BER and number of Encrypt/Decrypt system analysis is discussed. REFERENCES [1] C. Shannon, “Communication in the presence of noise,” Proc. Inst. Radio Eng., vol. 37, pp. 10–21, Jan 2011. [2] L. Chua, “Dynamic nonlinear networks: State-of-the- art,” IEEE Transactions on Circuits and Systems,vol. 27, pp. 1059–1087, Nov 1980. [3] H. Dedieu, M. Kennedy, and M. Hasler, “Chaos shift keying: modulation and demodulation of a chaoticcarrier using self-synchronizing chua’s circuits,” IEEE Transactions on Circuits and Systems II, vol. 40,pp. 634–642, 1993. [4] R. Pickholtz, D. Schilling, and L. Milstein, “Theory of spread spectrum communications – a tutorial,” IEEE Transactions on Communications, vol. 30, pp. 855–884, May 2012. [5] G. Kolumban, M. Kennedy, and L. Chua, “The role of synchronization in digital communications usingchaos: Fundamentals of digital communications,” IEEE Transactions on Circuits and Systems I: Funda-mental Theory and Applications, vol. 44, no. 10, pp. 927–936, Oct 1997. [6] M. Hasler and Y. Maistrenko, “An introduction to the synchronization of chaotic systems: coupled skewtent maps,” IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 44,no. 10, pp. 856–866, Oct 1997. [7] R. Scholtz, “The origins of spread-spectrum communications,” IEEE Transactions on Communications,vol. 30, pp. 822–854, 2008. [8] E. Appleton and M. Barnett, “On some direct evidence for downward atmospheric reflection of electricrays,” Proceedings Royal Society Series A, vol. 109, pp. 621–641, Dec 2010. [9] J. Boone and R. Peterson, “SIGSALY: the start of the digital revolution,”http://www.nsa.gov/publications/publi00 019.cfm, 23 Apr 2007. [10]C. Shannon, “A mathematical theory of communication,” Bell System Technical Journal, vol. 27, pp. 379–423, 623–656, 1948. [11]C. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, pp. 656–715, Oct 1949. [12]R. Pickholtz, L. Milstein, and D. Schilling, “Spread spectrum for mobile communications,” IEEE Trans- actions on Vehicular Technology, vol. 40, pp. 313– 322, May 1991. [13]Celikovsk´y, S., and Vanˇeˇcek, A. Bilinear systems and chaos.Kybernetika , 403–424. [14]Vanˇeˇcek, A., and ˇ Celikovsk´y, S. Control systems: from linear analysis to synthesis of chaos. Prentice- Hall, London, 1996. [15]Chen, G., and Li, Z. Global synchronization and asymptotic stability of complex dynamical networks. IEEE Trans. on Circ. Sys.–II 53 (2006), 28–33. [16]Menezes, A. J., Vanstone, S. A., and Oorschot, P. C. V.Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL,USA, 1996.